3707 patents
Page 79 of 186
Utility
Method for Managing Backup Jobs, Electronic Device and Computer Program Product
26 Aug 21
Embodiments of the present disclosure relate to a method for managing backup jobs, an electronic device, and a computer program product.
Min Liu, Ming Zhang, Ren Wang, Xiaoliang Zhu, Jing Yu
Filed: 31 May 20
Utility
Method, Device and Computer Program Product for Determining Execution Progress of Task
26 Aug 21
Embodiments of the present disclosure relate to a method, a device, and a computer program product for determining an execution progress of tasks.
Xiaoliang Zhu, Ming Zhang, Jing Yu, Yongsheng Guo, Min Liu
Filed: 31 May 20
Utility
0k3rrykzjrp1xycibubhtwekbp3e1978oukgmgbl4u8i0mtwdup5fisa
26 Aug 21
An apparatus includes at least one processing device configured to obtain information regarding a given asset to be repaired, to generate a recommended troubleshooting action to be performed on the given asset, and to provide the recommended troubleshooting action and the obtained information regarding the given asset as input to an encoder of a machine learning model implementing an attention mechanism.
Jeffrey Scott Vah, Ravi Shukla, Aaron Sanchez, Jim Henry Wiggers
Filed: 26 Feb 20
Utility
zmdv91qrukxl0sfzm41xploik3yae3moyry3y467dbg99j2
26 Aug 21
Methods and systems for data auto-tiering are disclosed.
Mahesh Reddy A V, Pradeep Viveki, Mahantesh Ambaljeri
Filed: 25 Feb 20
Utility
21ig9xkl2rv9f44jx 36dcwcuhjakf6alvcywc31r
26 Aug 21
Embodiments of this disclosure relate to a method, a device and a computer program product for data protection.
Simon Zhang, Leon Qianyun Cheng
Filed: 4 May 20
Utility
ten8t4hddn85284r6x7rp8ch5ml2i88u4im6n6glj70lsw1pb8hst
26 Aug 21
A production host includes storage for storing backup priorities of entities and backup windows during which a system, of which the production host is a member, is predicted to have sufficient computing resources to generate a backup for an entity of the entities and a backup manager that identifies a backup generation event for the entity; in response to identifying the backup generation event: identifying an earliest potential backup window of the backup windows; making a determination that the earliest potential backup window of the backup windows is reserved for a second entity of the entities; in response to making the determination: identifying that a backup priority of the backup priorities that is associated with the entity is greater than a second backup priority of the backup priorities that is associated with the second entity; and providing the backup services to the entity during the earliest potential backup window.
Shelesh Chopra, Jaishree Balasubramanian, Sujan Kumar Shetty
Filed: 26 Feb 20
Utility
dmiw0vk4m0lw1tdqe9vjkealg1t2nw9gvp6gxzkkxu8d
26 Aug 21
Embodiments of the present disclosure relate to a method for managing backup data, an electronic device, and a computer program product.
Jun Tang, Yi Wang, Qingxiao Zheng
Filed: 12 May 20
Utility
slhl6tkp879gcc28p18rrw2ev7fnfpsur1fk00aqbgs1rpq6nczb 1vpyh0x
26 Aug 21
A backup orchestrator for providing backup services to entities includes storage for storing backup windows during which backup storages are predicted to be able to service backup storage workloads; and a backup manager that identifies an occurrence of a backup generation event for an entity of the entities; in response to identifying the backup generation event: matches workload characteristics for generating a backup of the entity to a backup window of the backup windows that is associated with a backup storage of the backup storages; and generates the backup for the entity during the backup window and store the backup in the backup storage.
Shelesh Chopra, Jaishree Balasubramanian, Sujan Kumar Shetty
Filed: 26 Feb 20
Utility
ke35mftadp ftlv00rcamhiymbl43q5egs
26 Aug 21
According to example embodiments of the present disclosure, a method, an electronic device, and a computer program product for storage management are provided.
Simon Yuting Zhang, Yizhou Zhou, Aaron Chao Lin
Filed: 11 May 20
Utility
ur3rv4dmz9982gmbzv7ioxgmjmlb6y4k78b07uh4p4h
26 Aug 21
Efficient rolling transactions for a data storage system is described herein.
Mikhail Danilov, Yohannes Altaye
Filed: 20 Feb 20
Utility
xlbjsl4oig78bf2lptx0cscuqyy7p5e9gl7ni70bu9gu8pfyjw43bsjor1
26 Aug 21
Methods, apparatus, and processor-readable storage media for prioritizing patching of vulnerable components are provided herein.
Danny V. Dhillon, Charles W. Kaufman, Eric Baize
Filed: 24 Feb 20
Utility
uy13xk49cyyxazouwtc wma4ynaala6gj7
26 Aug 21
A set of security templates is maintained including first and second templates.
Craig L. Chaiken, Richard M. Tonry
Filed: 23 Apr 21
Utility
fkeec0e9vkbn9r2v hap1
19 Aug 21
In one aspect, adaptive replication modes in a storage system are provided.
Xiangping Chen, Ying Hu
Filed: 6 May 21
Utility
j8k6uzqsv4d0itsgge25e8qnq6suh6p9svdkrh v813z6orooz0ycwmcif5
19 Aug 21
A storage system comprises mixed-capacity storage devices, including at least one or more storage devices having relatively low capacities and one or more storage devices having relatively high capacities.
Yosef Shatsky, Rivka Matosevich
Filed: 18 Feb 20
Utility
r8qup5sid76kbyigv7thuh5pu59qb1cneudzcv01o1tuqk
19 Aug 21
Host computers running applications that store data on a block-based storage system such as a SAN provide hints that differentiate IO data based on which application generated the IO.
Kurumurthy Gokam, Md Haris Iqbal, Prasad Paple, Kundan Kumar
Filed: 14 Feb 20
Utility
qnw7w5i3oxil0hliy7eiw41k1qufhdqrzpwdhyavap1eh74
19 Aug 21
A host device discovers one or more first protocol endpoints presented by a storage system for a first logical storage device utilizing a first access protocol, and discovers one or more second protocol endpoints presented by the storage system for a second logical storage device utilizing a second access protocol.
Amit Pundalik Anchi, Sanjib Mallick
Filed: 18 Feb 20
Utility
m5wzemeqzmrodj uhgemfyf1dtpmxfuoyu7s4yorx18t79xzv
19 Aug 21
A method for use in a storage system, the method comprising: receiving an I/O command; identifying a latency of a first storage device that is associated with the I/O command; and executing the I/O command at least in part based on the latency, wherein executing the I/O command based on the latency includes: performing a first action when the latency is less than a first threshold, and performing a second action when the latency is greater than the first threshold, wherein identifying the latency includes retrieving the latency from a latency database, and wherein the first storage device is part of a storage array, the storage array including one or more second storage devices in addition to the first storage device.
Lior Kamran, Alex Soukhman
Filed: 13 Feb 20
Utility
gkqzgdzwimqfeqjzcv1d9jjj47n7l45
19 Aug 21
A method comprising: receiving, by a first storage node, an instruction to designate a first device file as the first storage node's primary device file for accessing a storage device designating, by the first storage node, the first device file as the first storage node's primary device file for accessing the storage device, the first device file being designated as the first storage node's primary device file for accessing the storage device in response to the first instruction; receiving, at the first storage node, an I/O command that is associated with the storage device; making a first attempt to complete the I/O command by using the first device file, detecting, by the first storage node, an error that is generated in response to the first attempt; designating, by the first storage node, a second device file as the first storage node's primary device file for accessing the storage device.
Lior Kamran, Alex Soukhman
Filed: 13 Feb 20
Utility
hk8c1qnf6irj9mzru9ghawvjgu712tl6vh3qlaj1bd8ru2
19 Aug 21
Transferring files directly from a storage system to a backup storage system includes determining identifiers for blocks on the storage system that correspond to files that are to be backed up, providing the identifiers for the blocks to the storage system, and the storage system pushing the blocks indicated by the identifiers directly from the storage system to the backup storage system.
Arieh Don, Stephen D. Smaldone, Vinay G. Rao, Sanjib Mallick
Filed: 19 Feb 20
Utility
5vyfg7fcy7rmbh7rjko85zuvwav3l
19 Aug 21
A method includes identifying a source virtual machine to be migrated from a source domain to a target domain, extracting file-in-use metadata and shared asset metadata from virtual machine metadata of the source virtual machine, and copying one or more files identified in the file-in-use metadata to a target virtual machine in the target domain.
Vaideeswaran Ganesan, Suren Kumar, Vinod Durairaj
Filed: 13 Feb 20